nccgroup / Solitude
Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
☆372Updated 3 years ago
Alternatives and similar repositories for Solitude:
Users that are interested in Solitude are comparing it to the libraries listed below
- Learning Shodan through katas☆464Updated 4 years ago
- Harden your Chrome browser via enterprise policy.☆281Updated last year
- Penetrum LLC opensource security tool list.☆651Updated 2 years ago
- This repo contains logstash of various honeypots☆175Updated 4 years ago
- OS image for the PiRogue based on Debian 12☆154Updated 6 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆699Updated this week
- A research-based starter pihole list to improve your privacy☆313Updated last year
- Private key usage verification☆423Updated 2 months ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆346Updated 11 months ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆245Updated 10 months ago
- A Passive SSH back-end and scanner.☆103Updated 8 months ago
- A honey token manager and alert system for AWS.☆317Updated 3 years ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- App that simplifies building decision trees to model adverse scenarios☆201Updated 7 months ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆299Updated 3 months ago
- Web on top of any protocol☆114Updated 4 years ago
- External monitoring for organization assets☆387Updated 8 months ago
- Repository demonstrating the Capital One breach on your AWS account☆241Updated 4 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆271Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆255Updated this week
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆293Updated 2 years ago
- Extract and Visualize Data from URLs using Unfurl☆627Updated this week
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 4 years ago
- ☆241Updated 7 months ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- AI-based, context-driven network device ranking☆295Updated last year
- Utility to find AES keys in running processes☆333Updated last year
- SolarWinds Orion Account Audit / Password Dumping Utility☆351Updated last year
- A collection of awesome projects, blog posts, books, and talks on quantifying risk☆446Updated 4 years ago